Addresses
Protocol
Wireless
Security
Data
100
What is the name of a 32-bit or 128-bit number that is used to identify a device? a. port number c. IP address b. protocol number d. IP version
What is D
100
Which protocol makes a connection, checks whether the data is received, and resends it if it is not? a. TCP c. IP b. UDP d. DNS
What is A
100
What is used to identify a wireless access point? a. secure key c. Network ID b. MAC address d. SSID
What is D
100
What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network? a. hub c. firewall b. switch d. VPN
What is C
100
Before data is transmitted on a network, it is first broken up into ____________________.
What is packets
200
How are IP addresses available to the Internet classified? a. public c. non-routable b. private d. standard
What is A
200
The solution for securing private data traveling over a public network, such as the Internet, is a _________. a. public encrypted network c. private encrypted network b. virtual private network d. virtual prevention network
What is B
200
What type of IP address should be configured on a wireless access point so that it can always be located by the devices that it serves? a. static IP address c. private IP address b. dynamic IP address d. default IP address
What is A
200
What is it called when a router is configured to open or close certain ports so they can or cannot be used. a. port triggering c. port filtering b. demilitarized zone (DMZ) d. port forwarding
What is D
200
Communication between two computers happens at three levels (layers) and these levels include the application, operating system, and ____________________.
What is hardware?
300
Which type of IP address is configured by a server when a device first initiates a connection to the network? a. default c. static b. dynamic d. configured
What is B
300
Which TCP/IP protocol is used by Windows to share files and printers on a network? a. Server Message Block (SMB) c. File Transfer Protocol (FTP) b. Lightweight Directory Access Protocol (LDAP) d. Hyp
What is A
300
Which wireless networking radio frequency yields faster speeds but offers shorter range? a. 2.4 GHz c. 7 GHz b. 5 GHz d. 11 GHz
What is B
300
A protocol used to convert private IP addresses on a LAN to a public IP address before a data packet is sent over the Internet
What is NAT
300
A ____________________ is the name of a computer and can be used in place of its IP address.
What is host name?
400
Which is used to identify the network portion and the host portion of an IP address? a. dynamic address c. default gateway b. DHCP address d. subnet mask
What is D
400
Which utility can be used to automatically diagnose a problem with a network connection? a. My Network Places c. Windows Network Diagnostics b. Device Manger d. Control Panel
What is C
400
Designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
What is WPS?
400
When a firewall opens a port because a computer behind the firewall initiates communication on another port
What is port triggering?
400
The first part of an IPv4 address identifies the network, and the last part identifies the ____________________.
What is host?
500
Which command can be used to display TCP/IP configuration information and refresh the IP address? a. msconfig c. ipconfig b. netstat d. netcfg32
What is C?
500
If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure static IP address settings for a second network. a. General Configuration c. Secondary Configuration b. Alternate Configuration d. Fallback Configuration
What is B
500
Assigns an IP address to a computer when it first attempts to initiate a connection to the network
What is DHCP server
500
Why shouldn't you place a wireless router by a window?
What is Easier for strangers to find your network?
500
Using __________________, when a firewall receives a request for communication from the Internet to a specific computer and port, the request will be allowed and forwarded to that computer on the network.
What is port forwarding?
M
e
n
u